How can organizations protect themselves from business email compromise (BEC)? John Wilson spoke to Cybersecurity Insiders about the complexities of these threats and shared important insights from Fortra's latest report on BEC.
Originally published in Cybersecurity Insiders.
Excerpt:
“During the interview, Wilson illuminated the various tactics employed in a BEC scam. These include phishing emails, spoofing tactics, and social engineering. The fraudsters often invest time in studying the organizational hierarchy, behaviors, and communication styles to make their deceitful requests appear legitimate.
BEC scams can also involve the installation of malware on a target’s system to gain unauthorized access to sensitive data. Fortra’s report further illustrates the scope and diversity of BEC strategies, indicating a need for businesses to enhance their defensive measures.”
Read the full article here.